Top 5 Automation for FortiGate Firewalls
Authors: Vasilis Bouloukos & Ulrica de Fort-Menares Keep your FortiGate firewalls running smoothly and free from zero day attacks, here’s our list of the most… Read More
Authors: Vasilis Bouloukos & Ulrica de Fort-Menares Keep your FortiGate firewalls running smoothly and free from zero day attacks, here’s our list of the most… Read More
New Platform Capabilities 1 – Suppress Issues You may occasionally need to place your security device into maintenance mode. During maintenance, devices might be unavailable… Read More
Alert fatigue is real. Just because Indeni on average has 60% more alerts than SNMP tools, it does not translate to more noise. Indeni keeps… Read More
The support for Palo Alto Networks Next Generation Firewalls (NGFW) is one of our flagship products. The coverage spans a wide variety of use cases,… Read More
Palo Alto Networks recently introduced AIOps for NGFW, the domain-centric AIOps solution. AIOps redefines the firewall operational experience by interpreting, predicting and resolving problems before… Read More
Curated Grafana Dashboards A critical part of managing security infrastructure is to collect telemetry data from firewalls, gaining deep visibility into network performance and health.… Read More
On March 29th, 2022, a remote code execution vulnerability in Spring Cloud Foundation was published. The vulnerability is known as Spring4Shell, tracked as CVE-2022-22965. Researchers believe… Read More
Linux has yet another high-severity vulnerability known as Dirty Pipe that was disclosed on March 7, 2022. Dirty Pipe allows an attacker to overwrite arbitrary… Read More
The best firewall monitoring tools can quickly detect problems, recommend actionable remediation steps, provide proactive alerts and validate best practices. While network performance monitoring tools… Read More
Indeni became aware of the vulnerability in PolKit’s kexec component, tracked as CVE-2021-4034 on January 25, 2022. The PolKit vulnerability has come to be known… Read More
After another year of remote working and virtual events, we have learned new ways to drive innovation and manage remote workforces. This year, CPX 360… Read More
Network capacity planning is the ongoing process of determining that a network has the resources it needs to prevent an impact on business-critical applications. It… Read More
Label Management A label is a group of multiple devices. Labels let you organize your devices, so you can view information about a group of… Read More
In the past two years, companies have experienced an unprecedented shift toward remote work as a result of the COVID-19 pandemic. This brought new challenges… Read More
At Indeni, as in many organizations, we took immediate actions following the details emerging around CVE-2021-44228. The Log4j vulnerability has come to be known as… Read More
Border Gateway Protocol (BGP) is the routing protocol underpinning the Internet. As networks connect with each other they require a way to communicate. BGP enables… Read More
Your firewall is the first line of defense against cyber attacks. No doubt firewalls are the most critical component of any security infrastructure for safeguarding… Read More
Device Backup Daily Digest Device backup is an important task for organizations to ensure their security infrastructure is safe from failure and disruption. With all… Read More